A Firmware Update Architecture for Internet of Things Devices
draft-ietf-suit-architecture-01

The information below is for an old version of the document
Document Type Expired Internet-Draft (suit WG)
Authors Brendan Moran  , Milosch Meriac  , Hannes Tschofenig  , David Brown 
Last updated 2019-01-03 (latest revision 2018-07-02)
Replaces draft-moran-suit-architecture
Stream IETF
Intended RFC status (None)
Formats
Expired & archived
pdf htmlized (tools) htmlized bibtex
Reviews
Stream WG state WG Document (wg milestone: Nov 2019 - Submit architecture ... )
On Agenda suit at IETF-110
Document shepherd No shepherd assigned
IESG IESG state Expired
Consensus Boilerplate Unknown
Telechat date
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at
https://www.ietf.org/archive/id/draft-ietf-suit-architecture-01.txt

Abstract

Vulnerabilities with Internet of Things (IoT) devices have raised the need for a solid and secure firmware update mechanism that is also suitable for constrained devices. Incorporating such update mechanism to fix vulnerabilities, to update configuration settings as well as adding new functionality is recommended by security experts. This document lists requirements and describes an architecture for a firmware update mechanism suitable for IoT devices. The architecture is agnostic to the transport of the firmware images and associated meta-data. This version of the document assumes asymmetric cryptography and a public key infrastructure. Future versions may also describe a symmetric key approach for very constrained devices.

Authors

Brendan Moran (brendan.moran@arm.com)
Milosch Meriac (milosch@meriac.com)
Hannes Tschofenig (Hannes.Tschofenig@gmx.net)
David Brown (david.brown@linaro.org)

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)